Short for Chief Information Officer, CIO is a job title given to someone within an enterprise who heads, at the executive board level, information technology within an organization. The CIO is largely responsible for the computer systems and the information technology (IT) that support the organization, and works within the organization’s budget to oversee the IT implementation, often reporting to the organization’s CFO (Chief Financial Officer). Within the organization, the job of a CIO is to overall derive greater demonstrable business value from IT spent. CIO is a job title that is most commonly used in the military, enterprise and larger business organizations.
Short for the Children’s Internet Protection Act, signed into law in December 2000. CIPA is designed to safeguard children against objectionable or harmful material on the Internet. CIPA amends the Elementary and Secondary Education Act of 1965 and the Communications Act of 1934. The amendments direct schools and libraries to have in place a policy […]
Short for committed information rate, a specified amount of guaranteed bandwidth (measured in bits per second) on a Frame Relay service. Typically, when purchasing a Frame Relay service, a company can specify the CIR level they wish. The Frame Relay network vendor guarantees that frames not exceeding this level will be delivered. It’s possible that […]
Pronounced sisk, and stands for complex instruction set computer. Most personal computers, use a CISC architecture, in which the CPU supports as many as two hundred instructions. An alternative architecture, used by many workstations and also some personal computers, is RISC (reduced instruction set computer), which supports fewer instructions.
(Certification for Information System Security Professional) A certification reflecting the qualifications of information systems security practitioners. The CISSP examination consists of 250 multiple choice questions, covering topics such as Access Control Systems, Cryptography, and Security Management Practices, and is administered by the International Information Systems Security Certification Consortium or (ISC)2 (www.isc2.org). The (ISC)2 promotes the […]
Short for Connected Limited Device Configuration. CLDC is the J2ME configuration for smaller handheld devices that are usually battery operated and low in memory with limited processing power and low bandwidth. Most often the CLDC uses the K virtual machine, which is suitable for devices with 16/32-bit RISC/CISC microprocessors/controllers, and with as little as 160 […]